Analysis

  • max time kernel
    91s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2022 11:33

General

  • Target

    file.exe

  • Size

    2.8MB

  • MD5

    8761d63dfe9073cb36f740dac5a18a5a

  • SHA1

    14e665b1a4074d9021b99f4254f268c884e9edbb

  • SHA256

    f00b5b3a58d763e384a36b3cface668c882f73ba33cd61a4667b9c3764600dbc

  • SHA512

    540b3bec0c799bba52c2d7fb3737a06fa5059083aa2f0a9a300d016cf157cfe974b6f05a28540b9300a9de43c5b7723407ae02dbd5842f252e7537402c994fac

  • SSDEEP

    49152:LQ/PvtpK/58lhMPUMNU/la/sACLVmNvXqgG/WFJuRswp18euw93ETTgkk:GPvfI5YiKzlLVsGmcuAV2k

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4936-132-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/4936-133-0x0000000077D30000-0x0000000077ED3000-memory.dmp

    Filesize

    1.6MB

  • memory/4936-134-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/4936-135-0x0000000005230000-0x00000000057D4000-memory.dmp

    Filesize

    5.6MB

  • memory/4936-136-0x0000000005150000-0x00000000051E2000-memory.dmp

    Filesize

    584KB

  • memory/4936-137-0x00000000057E0000-0x0000000005DF8000-memory.dmp

    Filesize

    6.1MB

  • memory/4936-138-0x0000000005E40000-0x0000000005F4A000-memory.dmp

    Filesize

    1.0MB

  • memory/4936-139-0x0000000005F70000-0x0000000005F82000-memory.dmp

    Filesize

    72KB

  • memory/4936-140-0x0000000005F90000-0x0000000005FCC000-memory.dmp

    Filesize

    240KB

  • memory/4936-142-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/4936-141-0x0000000006CA0000-0x0000000006D06000-memory.dmp

    Filesize

    408KB

  • memory/4936-143-0x0000000077D30000-0x0000000077ED3000-memory.dmp

    Filesize

    1.6MB

  • memory/4936-144-0x0000000008400000-0x00000000085C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4936-145-0x00000000085D0000-0x0000000008AFC000-memory.dmp

    Filesize

    5.2MB

  • memory/4936-146-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/4936-147-0x0000000077D30000-0x0000000077ED3000-memory.dmp

    Filesize

    1.6MB